blob: 791fe8fcb719bbf36f79524cd1c56f3966f869f4 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200903-25">
<title>Courier Authentication Library: SQL Injection vulnerability</title>
An SQL injection vulnerability has been discovered in the Courier
Authentication Library.
<product type="ebuild">courier-authlib</product>
<announced>March 11, 2009</announced>
<revised>March 11, 2009: 01</revised>
<package name="net-libs/courier-authlib" auto="yes" arch="*">
<unaffected range="ge">0.62.2</unaffected>
<vulnerable range="lt">0.62.2</vulnerable>
The Courier Authentication Library is a generic authentication API that
encapsulates the process of validating account passwords.
It has been reported that some parameters used in SQL queries are not
properly sanitized before being processed when using a non-Latin locale
Postgres database.
<impact type="normal">
A remote attacker could send specially crafted input to an application
using the library, possibly resulting in the execution of arbitrary SQL
There is no known workaround at this time.
All Courier Authentication Library users should upgrade to the latest
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-libs/courier-authlib-0.62.2&quot;</code>
<uri link="">CVE-2008-2380</uri>
<metadata tag="requester" timestamp="Sat, 07 Mar 2009 18:32:02 +0000">
<metadata tag="submitter" timestamp="Tue, 10 Mar 2009 12:55:53 +0000">
<metadata tag="bugReady" timestamp="Wed, 11 Mar 2009 10:55:30 +0000">